gsd-2022-31667
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2022-31667", "id": "GSD-2022-31667" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-31667" ], "id": "GSD-2022-31667", "modified": "2023-12-13T01:19:17.717303Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-31667", "STATE": "RESERVED" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003e=v1.0 \u003c=v1.10.12 || \u003e=v2.0 \u003c=v2.4.2 || \u003e=v2.5 \u003c=v2.5.1", "affected_versions": "All versions starting from 1.0 up to 1.10.12, all versions starting from 2.0 up to 2.4.2, all versions starting from 2.5 up to 2.5.1", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2022-09-16", "description": "### Impact\nHarbor fails to validate the user permissions when updating a robot account that\nbelongs to a project that the authenticated user doesn\u2019t have access to. API call:\n\nPUT /robots/{robot_id}\n\nBy sending a request that attempts to update a robot account, and specifying a robot\naccount id and robot account name that belongs to a different project that the user\ndoesn\u2019t have access to, it was possible to revoke the robot account permissions.\n\n### Patches\nThis and similar issues are fixed in Harbor v2.5.2 and later. Please upgrade as soon as possible.\n\n### Workarounds\nThere are no workarounds available.\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Open an issue in [the Harbor GitHub repository](https://github.com/goharbor/harbor)\n\n### Credits\nThanks to [Gal Goldstein](https://www.linkedin.com/in/gal-goldshtein/) and [Daniel Abeles](https://www.linkedin.com/in/daniel-abeles/) from [Oxeye Security](https://www.oxeye.io/) for reporting this issue.\n", "fixed_versions": [ "v1.10.13", "v2.4.3", "v2.5.2" ], "identifier": "GMS-2022-4261", "identifiers": [ "GHSA-xx9w-464f-7h6f", "GMS-2022-4261", "CVE-2022-31667" ], "not_impacted": "All versions before 1.0, all versions after 1.10.12 before 2.0, all versions after 2.4.2 before 2.5, all versions after 2.5.1", "package_slug": "go/github.com/goharbor/harbor", "pubdate": "2022-09-16", "solution": "Upgrade to versions 1.10.13, 2.4.3, 2.5.2 or above.", "title": "Improper Access Control", "urls": [ "https://github.com/goharbor/harbor/security/advisories/GHSA-xx9w-464f-7h6f", "https://github.com/advisories/GHSA-xx9w-464f-7h6f" ], "uuid": "eee3bb39-0eb5-41a6-8974-e746e6043a2d", "versions": [ { "commit": { "sha": "69ebc92f873d0992379fbf687797e8687a7ddbcd", "tags": [ "1.1.0-rc1" ], "timestamp": "20170405112626" }, "number": "v1.0" }, { "commit": { "sha": "d0f3ddddab96f25b7c2de18e7aebf8f79c7b19cc", "tags": [ "v2.0.0" ], "timestamp": "20200513104407" }, "number": "v2.0" }, { "commit": { "sha": "ef2e2e568e5128fe8d3191aef6bcdfdce0b45c2c", "tags": [ "v2.4.2", "v2.4.2-rc1" ], "timestamp": "20220315032134" }, "number": "v2.4.2" }, { "commit": { "sha": "98e1b82fbfcc0f1ab9673e0911ae937e6a6fca36", "tags": [ "v2.5.0", "v2.5.0-rc4" ], "timestamp": "20220407073407" }, "number": "v2.5" }, { "commit": { "sha": "b0506782b47db387e33a282fc86c8f8d41a4172f", "tags": [ "v2.5.1", "v2.5.1-rc1" ], "timestamp": "20220526154154" }, "number": "v2.5.1" }, { "commit": { "sha": "66882717920d0337f17a43d5450b6227ca98047e", "tags": [ "v2.5.2", "v2.5.2-rc1" ], "timestamp": "20220628181302" }, "number": "v2.5.2" }, { "commit": { "sha": "1a5aace1222a7c6217c2c95e2bc45a954227b079", "tags": [ "v1.10.12", "v1.10.12-rc1" ], "timestamp": "20220731082241" }, "number": "v1.10.12" }, { "commit": { "sha": "85ef1409cba206582b1b6947c888bdbe6d5747d3", "tags": [ "v2.4.3", "v2.4.3-rc1" ], "timestamp": "20220801031230" }, "number": "v2.4.3" }, { "commit": { "sha": "563555c92f0d07c31e57c7129729742e9fb3b998", "tags": [ "v1.10.13", "v1.10.13-rc1" ], "timestamp": "20220823024348" }, "number": "v1.10.13" } ] } ] } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…